Suggested Topics within your search.
Suggested Topics within your search.
- Citizen participation 1
- Collectors and collecting 1
- Cultural property 1
- Electronics 1
- Film adaptations 1
- Historic preservation 1
- Historiography 1
- History 1
- History and criticism 1
- Human-computer interaction 1
- Intangible property 1
- Mass media 1
- Mass media and technology 1
- Mnemonics 1
- Motion pictures and literature 1
- Museums and community 1
- Nursing 1
- Pharmacology 1
- Philosophy 1
- Protection 1
- Slavery--Religious aspects 1
- Social aspects 1
- Sound recording industry 1
- Sound recordings 1
- Study and teaching 1
- Technological innovations 1
-
3901
A Precocious Cerebellar Ataxia and Frequent Fever Episodes in a 16-Month-Old Infant Revealing Ataxia-Telangiectasia Syndrome
Published 2013-01-01“…Peripheral lymphocytes subsets showed reduction of T cells with a marked predominance of T cells with a memory phenotype and a corresponding reduction of naïve T cells; NK cells were very increased (41%) with normal activity. …”
Get full text
Article -
3902
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…The current router security issues focus on the mining and utilization of memory-type vulnerabilities, but there is low interest in detecting backdoors.Hard-coded backdoor is one of the most common backdoors, which is simple and convenient to set up and can be implemented with only a small amount of code.However, it is difficult to be discovered and often causes serious safety hazard and economic loss.The triggering process of hard-coded backdoor is inseparable from string comparison functions.Therefore, the detection of hard-coded backdoors relies on string comparison functions, which are mainly divided into static analysis method and symbolic execution method.The former has a high degree of automation, but has a high false positive rate and poor detection results.The latter has a high accuracy rate, but cannot automate large-scale detection of firmware, and faces the problem of path explosion or even unable to constrain solution.Aiming at the above problems, a hard-coded backdoor detection algorithm based on string text semantic conflict (Stect) was proposed since static analysis and the think of stain analysis.Stect started from the commonly used string comparison functions, combined with the characteristics of MIPS and ARM architectures, and extracted a set of paths with the same start and end nodes using function call relationships, control flow graphs, and branching selection dependent strings.If the strings in the successfully verified set of paths have semantic conflict, it means that there is a hard-coded backdoor in the router firmware.In order to evaluate the detection effect of Stect, 1 074 collected device images were tested and compared with other backdoor detection methods.Experimental results show that Stect has a better detection effect compared with existing backdoor detection methods including Costin and Stringer: 8 hard-coded backdoor images detected from image data set, and the recall rate reached 88.89%.…”
Get full text
Article -
3903
Improving the Forecast Accuracy of PM<sub>2.5</sub> Using SETAR-Tree Method: Case Study in Jakarta, Indonesia
Published 2024-12-01“…PM<sub>2.5</sub> exhibits significant nonlinear fluctuations; thus, this study employed two machine learning approaches: self-exciting threshold autoregressive tree (SETAR-Tree) and long short-term memory (LSTM). The SETAR-Tree model integrates regime-switching capabilities with decision tree principles to capture nonlinear patterns, while LSTM models long-term dependencies in time-series data. …”
Get full text
Article -
3904
An Improved Harmony Search Algorithm for Proactive Routing Protocol in VANET
Published 2021-01-01“…Therefore, this paper aims to propose an improved harmony search optimization (EHSO) algorithm that considers the configuration of the OLSR parameters by coupling two stages, a procedure for optimization carried out by the EHSO algorithm based on embedding two popular selection methods in its memory, namely, roulette wheel selection and tournament selection. …”
Get full text
Article -
3905
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01“…IoT devices often operate under strict constraints in processing power, memory, and energy consumption, complicating the implementation of robust security measures. …”
Get full text
Article -
3906
WGAN-DL-IDS: An Efficient Framework for Intrusion Detection System Using WGAN, Random Forest, and Deep Learning Approaches
Published 2024-12-01“…Then, we use three deep learning techniques, Multi-Layer Perceptron (MLP), Convolutional Neural Network (CNN), and Long Short-Term Memory (LSTM), to classify the attacks. We implement and evaluate this proposed framework on the CICIDS2017 dataset. …”
Get full text
Article -
3907
Scolar, Mufti and Politician – Three “Lives” of Jakub Szynkiewicz
Published 2023-10-01“…Both in the area of science and in the religious and administrative field, he achieved great success, leaving behind a significant legacy and a good memory. Perhaps only his political activity causes censure and various interpretations in modern literature, since it was based on the dubious basis of cooperation with a totalitarian, criminal regime. …”
Get full text
Article -
3908
Effectiveness of Badminton Physical Program on Mental Capacities in Healthy Older Adults
Published 2024-12-01“…Older people suffer from reduced mental and cognitive parameters such as executive function, working memory and cognitive flexibility. However, information about how racquet sports can improve mental skills in older adults requires greater analysis and research. …”
Get full text
Article -
3909
Glucose Fluctuation Inhibits Nrf2 Signaling Pathway in Hippocampal Tissues and Exacerbates Cognitive Impairment in Streptozotocin-Induced Diabetic Rats
Published 2024-01-01“…It was manifested that GF not only aggravated the impairment of spatial memory in rats with STZ-induced type 2 DM but also stimulated the loss, shrinkage, and apoptosis of hippocampal neurons. …”
Get full text
Article -
3910
Recognition model for major depressive disorder in Arabic user-generated content
Published 2025-01-01“…In multi-classification, we used DL techniques such as “long short-term memory (LSTM),” and used BERT transformers “Multilingual BERT.” …”
Get full text
Article -
3911
Follicular Helper CD4+ T Cells in Human Neuroautoimmune Diseases and Their Animal Models
Published 2015-01-01“…Follicular helper CD4+ T (TFH) cells play a fundamental role in humoral immunity deriving from their ability to provide help for germinal center (GC) formation, B cell differentiation into plasma cells and memory cells, and antibody production in secondary lymphoid tissues. …”
Get full text
Article -
3912
IGN: Invariable gene set-based normalization for chromatin accessibility profile data analysis
Published 2025-01-01“…We demonstrate the effectiveness of IGN in analyzing central memory CD8+ T cell activation, a system with anticipated global reprogramming of chromatin and gene expression, and show that IGN outperforms existing methods. …”
Get full text
Article -
3913
Feature Fusion Model Using Transfer Learning and Bidirectional Attention Mechanism for Plant Pipeline Leak Detection
Published 2025-01-01“…In Stage 2, the classifier layers of the pre-trained models are removed, and the extracted features are fused and processed using a bidirectional long short-term memory (LSTM) network. An attention mechanism is incorporated within the LSTM to prioritize critical features, enhancing the ability of the model to distinguish leak signals from noise. …”
Get full text
Article -
3914
Amputee Gait Phase Recognition Using Multiple GMM-HMM
Published 2024-01-01“…We compare our approach with the widely used CHMM (Continuous HMM) and LSTM (Long Short-term Memory) based methods, demonstrating better recognition accuracy performance across all scenarios.…”
Get full text
Article -
3915
The Short-Term Wind Power Forecasting by Utilizing Machine Learning and Hybrid Deep Learning Frameworks
Published 2025-02-01“…In pursuit of these objectives, the CNN GRU model was rigorously tested and compared against three additional models: CNN with bidirectional long short-term memory (BiLSTM), extreme gradient boosting (XGBoost), and random forest (RF). …”
Get full text
Article -
3916
Anomaly detection of adversarial cyber attacks on electric vehicle charging stations
Published 2025-03-01“…An EVCI system is simulated in the MATLAB/SIMULINK environment for various scenarios of data generation. A Long Short Term Memory (LSTM) based autencoder model is used for predicting the charging port current magnitudes that capture the temporal dependencies in the sequential EVCI data. …”
Get full text
Article -
3917
Acute effects of virtual reality exercise bike games on psychophysiological outcomes in college North-African adolescents with cerebral palsy: A randomized clinical trial [version...
Published 2024-11-01“…While participants in the VRE group exhibited enhanced attention levels and reported elevated levels of vigor subsequent to the exercise sessions, the memory results did not reach statistical significance. …”
Get full text
Article -
3918
A deep-learning approach to parameter fitting for a lithium metal battery cycling model, validated with experimental cell cycling time series
Published 2025-02-01“…Toward this goal, we propose the use of a Convolutional Neural Network-Long-Short Term Memory (CNN-LSTM) to identify relevant physico-chemical parameters in the PDE model and to describe the behaviour of simulated and experimental charge–discharge profiles. …”
Get full text
Article -
3919
Modular cone-and-plate device for mechanofluidic assays in Transwell inserts
Published 2025-01-01Get full text
Article -
3920
From light sensing to adaptive learning: hafnium diselenide reconfigurable memcapacitive devices in neuromorphic computing
Published 2025-01-01“…Although charge-based or emerging memory technologies such as memristors have been developed to emulate synaptic plasticity, replicating the key functionality of neurons—integrating diverse presynaptic inputs to fire electrical impulses—has remained challenging. …”
Get full text
Article